{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,14]],"date-time":"2025-10-14T06:43:51Z","timestamp":1760424231759,"version":"build-2065373602"},"publisher-location":"Singapore","reference-count":15,"publisher":"Springer Nature Singapore","isbn-type":[{"value":"9789819531844","type":"print"},{"value":"9789819531851","type":"electronic"}],"license":[{"start":{"date-parts":[[2025,10,13]],"date-time":"2025-10-13T00:00:00Z","timestamp":1760313600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2025,10,13]],"date-time":"2025-10-13T00:00:00Z","timestamp":1760313600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2026]]},"DOI":"10.1007\/978-981-95-3185-1_12","type":"book-chapter","created":{"date-parts":[[2025,10,14]],"date-time":"2025-10-14T06:05:45Z","timestamp":1760421945000},"page":"183-196","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["SemBits: Multi-bit Semantic Watermarking with\u00a0Sentence-Level Hashing for\u00a0LLMs"],"prefix":"10.1007","author":[{"given":"Xiangyu","family":"Feng","sequence":"first","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Pei-Gen","family":"Ye","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"297","published-online":{"date-parts":[[2025,10,13]]},"reference":[{"key":"12_CR1","unstructured":"Chen, L., et al.: Are more LLM calls all you need? Towards the scaling properties of compound AI systems. Adv. Neural Inf. Process. Syst. 37, 45767\u201345790 (2024)"},{"key":"12_CR2","doi-asserted-by":"crossref","unstructured":"Taneja, J., Laird, A., Yan, C., Musuvathi, M., Lahiri, S.K.: LLM-vectorizer: LLM-based verified loop vectorizer. In: Proceedings of the 23rd ACM\/IEEE International Symposium on Code Generation and Optimization, pp. 137\u2013149 (2025)","DOI":"10.1145\/3696443.3708929"},{"key":"12_CR3","doi-asserted-by":"crossref","unstructured":"Yao, Y., et al.: A survey on large language model (LLM) security and privacy: the good, the bad, and the ugly. High-Confidence Computing, pp. 100211 (2024)","DOI":"10.1016\/j.hcc.2024.100211"},{"key":"12_CR4","doi-asserted-by":"crossref","unstructured":"Wang, X., Kim, H., Rahman, S., Mitra, K., Miao, Z.: Human-LLM collaborative annotation through effective verification of LLM labels. In: Proceedings of the 2024 CHI Conference on Human Factors in Computing Systems, pp. 1\u201321 (2024)","DOI":"10.1145\/3613904.3641960"},{"key":"12_CR5","unstructured":"Liang, Y., Xiao, J., Gan, W., Yu, P.S.: Watermarking techniques for large language models: A survey. arXiv preprint arXiv:2409.00089 (2024)"},{"key":"12_CR6","doi-asserted-by":"crossref","unstructured":"Qiu, J., Yang, X., Li, S., Chen, K., Zhang, W., Yu, N.: Watermarking datasets for LLM fine-tuning. In: ICASSP 2025-2025 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 1\u20135. IEEE (2025)","DOI":"10.1109\/ICASSP49660.2025.10889741"},{"key":"12_CR7","unstructured":"Ning, K., et al.: MCGMark: An encodable and robust online watermark for LLM-generated malicious code. arXiv preprint arXiv:2408.01354 (2024)"},{"key":"12_CR8","unstructured":"Zhang, R., Hussain, S.S., Neekhara, P., Koushanfar, F.: $$\\{$$REMARK-LLM$$\\}$$: a robust and efficient watermarking framework for generative large language models. In: 33rd USENIX Security Symposium (USENIX Security 24), pp. 1813\u20131830 (2024)"},{"key":"12_CR9","unstructured":"Wang, L., et al.: Towards codable watermarking for injecting multi-bits information to LLMs. In: ICLR (2024)"},{"key":"12_CR10","unstructured":"Pang, Q., Hu, S., Zheng, W., Smith, V.: Attacking LLM watermarks by exploiting their strengths. In: ICLR 2024 Workshop on Secure and Trustworthy Large Language Models (2024)"},{"key":"12_CR11","unstructured":"Huo, M., Somayajula, S.A., Liang, Y., Zhang, R., Koushanfar, F., Xie, PL.: Token-specific watermarking with enhanced detectability and semantic coherence for large language models. arXiv preprint arXiv:2402.18059 (2024)"},{"key":"12_CR12","unstructured":"Cai, Y., Wang, Y., Hu, D., Gu, C.: Modification and generated-text detection: Achieving dual detection capabilities for the outputs of LLM by watermark. arXiv preprint arXiv:2502.08332 (2025)"},{"key":"12_CR13","unstructured":"Xu, Z., Zhang, K., Sheng, V.S.: FreqMark: Frequency-based watermark for sentence-level detection of LLM-generated text. arXiv preprint arXiv:2410.10876 (2024)"},{"key":"12_CR14","doi-asserted-by":"crossref","unstructured":"Hou, A., et al.: SemStamp: a semantic watermark with paraphrastic robustness for text generation. In: Proceedings of the 2024 Conference of the North American Chapter of the Association for Computational Linguistics: Human Language Technologies (Volume 1: Long Papers), pp. 4067\u20134082 (2024)","DOI":"10.18653\/v1\/2024.naacl-long.226"},{"key":"12_CR15","unstructured":"Cover, T.M., Thomas, J.A., et\u00a0al.: Entropy, relative entropy and mutual information. Elem. Inf. Theory 2(1), 12\u201313 (1991)"}],"container-title":["Lecture Notes in Computer Science","Data Security and Privacy Protection"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-981-95-3185-1_12","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,10,14]],"date-time":"2025-10-14T06:05:53Z","timestamp":1760421953000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-981-95-3185-1_12"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,10,13]]},"ISBN":["9789819531844","9789819531851"],"references-count":15,"URL":"https:\/\/doi.org\/10.1007\/978-981-95-3185-1_12","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"value":"0302-9743","type":"print"},{"value":"1611-3349","type":"electronic"}],"subject":[],"published":{"date-parts":[[2025,10,13]]},"assertion":[{"value":"13 October 2025","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"DSPP","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Data Security and Privacy Protection","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Xi'an","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"China","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2025","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"16 October 2025","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"18 October 2025","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"3","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"dspp2025","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/dspp2025.xidian.edu.cn\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}